Cache folders, 280
California:
anti-stalking law, 599
Penal Code, 600
California v. Greenwood, 53–4
Caller-ID, 101
systems, 391
Canada:
Criminal Code in, 26, 365
Section 206 (1) b, 4
Pecciarich case, 179
Cardinfo command, 341–2
Cards4Labs, 29, 354
Carnivore, 29, 429
Case:
involving digital evidence, proper evidence handling, 186
management, 102
and incident resolution process, overview of, 92
Casey's Certainty Scale, 173–4
Cassidy case, 478
Catalog, 297, 323
record, 326
Categories:
of cybercrime, 221
of investigative process model, 101–3
CDMA (Code Division Multiple Access), 369–70
CDPD (Cellular Digital Packet Data), 369
Cell sites, 368
Cellular networks, 368
Cellular phones, 35, 337, 369, 442, 600
Certainty Scale, 2, 176, 183, 186, 250
advantages, 177
Certainty values (C-values), 176
Chain of custody of evidence, 106, 185
maintaining and documenting, 169–70
Chat rooms, 42, 50, 128, 152, 378
Chat Monitor, 18, 513
Checksum, 110, 422
Child abuse, 11, 83, 163, 378
cases, 568
on the Internet, 481
Child exploitation investigation, problems, 496
Child abusers, 49
networks of, 564
Child Online Protection Act (COPA), 47–8
Child pornographers, study of, 565
Child pornography, 9, 13–14, 18, 26, 35, 37, 49–50, 65, 69–72, 100, 117, 134, 152, 170–1, 178, 214, 230, 239, 244, 252, 286, 356, 383, 386, 392, 479, 485, 563, 571, 574, 576, 579, 585
on the Internet, 481
motivation, 585
penalties, 80, 82
US law, 568–9
Child Pornography Prevention Act (CPPA), 49–50
Child Protection and Obscenity Enforcement Act, 49
Child Protection Restoration and Penalties Enforcement Act, 49
Child Sexual Abuse and Pornography Act, 49
Chunk, 339
Circuit-switched networks, 443
Cisco, 362, 424
fire-wall, 393
Private Internet eXchange (PIX) firewall, 400, 469
routers, 392
Citibank case, 75, 79
Class characteristics, 97–8
individual characteristics of data, 113, 230–7
Classification
comparison, and evaluation of source, 539–40
offenders, 159
offense behaviors, 159
Climate-controlled room, 223
Clinton, US President, 33
Cloned cellular phones, 36
Clusters, 201, 205
CMOS (Complementary Metal Oxide Silicon):
configuration tool, 196
microchip, 197
CNID (Catalog node ID), 323
COE Convention of Cybercrime, 75
Collateral victims, 662
Collection of digital evidence, 1–3, 14, 20, 116–17, 220–8
application layer, 477
in computer networks, 29
sector-by-sector, 261
cybertrails, 359, 391, 393, 417, 489, 517, 600, 610, 617
data-link layer, 374, 420
empirical law, 226
entire computer, 225, 630
guidelines, 628
hardware, 222–5
information needed, 225
Internet evidence, 132
intrusion investigations, 100, 117, 120
network layer, 375
network traffic using sniffer, 428
options, advantages and disadvantages of, 228
portion of computer contents, 631
precautions with suspects, 225, 571, 592
preservation, 220–8
Columbia Space Shuttle crash, 383
Commerce Clause of the United States Constitution, 567
Commercial systems, digital evidence on, 19
Commercial Web proxies, 497
Common languages, 370–81
Common Law:
criminal law enforcement, 567
"Right of Privacy", 51
Communication systems, 12, 21
Communications Decency Act (CDA), 46–7
Community standards issues, 46
Compact disk, digital evidence storage, 630
Compaq, 403
Compensatory (power reassurance) behavior, 159–60, 671
Component theft, 25
Computer/s:
basic operation of, 195–9
basics for digital evidence examiners, 191
brief history of, 191–5
cracker, 666
crime, 667
definition of, 30
investigation, history and terminology of, 25–6
forensics, 31
intruders:
method of approach and attack, 544
operation of, 522–6
intrusions:
detailed case example, 554
and fraud, 25
investigating, 521
logon record, 179
material, unauthorized modification of, 75–6
misuse, 72–6
in America, 62–5
networks, brief history of, 360
role in crime, 31
security professionals, 93
virus, 165
Computer Abuse Act, (UK), 26, 30
Computer Assistance Law Enforcement Act (CALEA) (US), 38
Computer based evidence, good practices guide, 107
Computer Fraud and Abuse Act (CFAA), (US), 26, 30, 62–3, 75, 452
Computer Misuse Act, 72, 76, 78–9
Criminal Justice Act, (UK), 70, 568
Criminal Justice and Court Service Act (UK), 80
Computer-related crime, four categories, 32
Concentrator see Hubs
Confidential and/or illicit materials, broad dissemination of, 151
Connectedness, 148
Connecticut State Crime Lab, 593
Connecticut v. Sorabella, 582
Connection management, 450–4
Connectionless Network Protocol (CLNP), 371
Constellations of similar characteristics, 234
Content Scrambling System (CSS), 60
Continuity of offense, 572
potential sources of evidence for, 100
Contraband hardware, 34–6
Contraband information, 14, 35, 37
Convention on Extradition, 78
Cookie files, 280, 332
COPA see Child Online Protection Act
Copernic, 492
COPINE, 481
Copying digital evidence:
backup copies, 203, 292
bitstream copy, 294, 395, 397, 419
entire computer, 225, 630
labeling of copies, 397, 628
sector-by-sector, 261
Copyrights:
background, 57–8
law, 57
and the "theft" of digital intellectual property, 57–62
Copyright Act, 58, 60–1
Copyright Term Extension Act, 57
Corpus delicti, 118, 120, 667
CORPX domain, 459
Cotton gin, 148
Council of Europe Convention on Cybercrime, 67
Court of Appeals, 48–9, 61
CPPA see Child Pornography Prevention Act
CPU (Central Processing Unit), 195
Crackers, computer, 216, 663
password, 270
profiles of, 541
Credit cards, 19
Credit institutions, 37
unauthorized access to records from, 30
Crime:
on the Internet, 17
reconstruction, 663
Crime scene:
characteristics, 129–33, 544–9, 663
with multiple locations on the Internet, 128–9
spread around world on personal computers and servers, 129
type, 663
Criminals:
activity on the Internet, 517
applications of viruses, 165
motive, 158
MO, 150
and specific virtual spaces, 131
Criminal Damage Act, 76
Criminal defense attorneys and experts, 4
Criminal Justice and Public Order Act, 70
Cryptography, 208
CryptoPad, 353
CSMA/CD (Carrier Sense Multiple Access with Collision Detection), 366, 422
C-Scale see Certainty Scale
Ctime, 294
Current Technologies, 165
Cyberpanic, 30, 149, 663
Cyberspace, 667
Cyberstalker, 19
case example, 612–14
escalation and violence, 605
MO and signature bahaviors, 610
operation of, 600–3
Cyberstalking, 599, 663
investigating interviews, 606
investigating stages, 605–11
investigation:
crime scene characteristics, 610–11
motivation, 611
risk assessment, 605, 607–8
search, 608–10
victimology, 605, 607–8
Cybertrail, 17–20, 671
challenging aspects of, 20
Cylinder, 200
Cypherpunk, 499